To reduce the risk of this happening to you if you’re a T-Mobile customer, call 611 from your cellphone or 1-800-937-8997 and tell a support staffer that you want to create a “port validation” passcode. This is also called a phone passcode or PIN, depending on your provider (most US providers offer this feature now). Motherboard confirmed that Sprint, T-Mobile, Verizon and U.S. Cellular all give customers this option.

In the 1980s, defenders had to invent computer emergency response teams. In the 1990s, it was an innovation to have a chief information security officer to centralize authority or build an information sharing and analysis center to share and collaborate with peers. In the 2010s, the idea of a cyber kill chain changed how defenders conceptualize their job. Further improving operational coordination―through response playbooks, frequent exercises, and groups like information sharing and analysis organizations―can be an inexpensive way to build significant capability. Such revolutionary innovations have a very modest cost yet are often overlooked in favor of the newest technological gadgets.

There’s a lot of different campaign and actor names and it’s tough to keep them all straight — just see here.

The Council on Foreign Relations released a new tool, the Cyber Operations Tracker. The tool is a database of the publicly known state-sponsored cyber incidents that have occurred since 2005. The database contains almost two hundred entries of state-sponsored cyber incidents or threat actors for which data is publicly available. Want to know who is spying on whom? Looking for the number of times North Korea has been publicly denounced for its cyber operations? Heard of Equation Group but would like to know more about it? The tracker can help answer all of these questions.